Lucene search

K
gentooGentoo FoundationGLSA-200605-06
HistoryMay 06, 2006 - 12:00 a.m.

Mozilla Firefox: Potential remote code execution

2006-05-0600:00:00
Gentoo Foundation
security.gentoo.org
17

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.96

Percentile

99.5%

Background

Mozilla Firefox is the next-generation web browser from the Mozilla project.

Description

Martijn Wargers and Nick Mott discovered a vulnerability when rendering malformed JavaScript content. The Mozilla Firefox 1.0 line is not affected.

Impact

If JavaScript is enabled, by tricking a user into visiting a malicious web page which would send a specially crafted HTML script that contains references to deleted objects with the “designMode” property enabled, an attacker can crash the web browser and in theory manage to execute arbitrary code with the rights of the user running the browser.

Workaround

There is no known workaround at this time.

Resolution

All Mozilla Firefox 1.5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.3"

All Mozilla Firefox 1.5 binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-client/mozilla-firefox< 1.5.0.3UNKNOWN
Gentooanyallwww-client/mozilla-firefox-bin< 1.5.0.3UNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.96

Percentile

99.5%